EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1)

Size: px
Start display at page:

Download "EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1)"

Transcription

1 EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1) A.William Walls Research Scholar Department of Computer Science SSM College of Arts and Science Komarapalayam, India Mrs.N.Chandrakala Head & Professor Department of Computer Science SSM College of Arts and Science Komarapalayam, India n [email protected] Abstract- Cloud computing has been enabling its users to access the shared resources through internet reduced cost resource utilization. The security for the data in cloud is very important. integrity refers to maintaining and assuring the accuracy and consistency of data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data. The term data integrity is broad in scope and may have widely different meanings depending on the specific context even under the same general umbrella of computing. Fault tolerance and the integrity checking of data are difficult. The data are stored in multiple servers. integrity protection scheme is used for code regeneration. It is used to find the fault tolerance and repair traffic saving. integrity protection enables the client to verify the integrity of the outsourced data. A. Cloud Services Sikder Sunbeam Islam et al., [Sikder Sunbeam Islam et al., 2012] say cloud computing can offer the services dealing with the data, software and computation through the internet and hence there are three services in cloud Figure A, Explain the cloud such as SaaS, PaaS and IaaS. End User Web browser, Mobile phones, Laptops, Desktops Keywords- integrity, Retrieves data, Fault tolerance, Repair traffic saving I. INTRODUCTION L.Ronald et al., [L.Ronald et al.,2010] say to cloud computing is a model for enabling ubiquitous, convenient, ondemand network access to a shared pool of configurable computing resources such as hardware and software that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing is a technology that uses the internet and central remote server to maintain data and applications. Cloud computing allows users to use application without installation and access personal file at any computer with access internet. The cloud computing allows much more efficient centralizing data storage, processing and bandwidth. Cloud Computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises Cloud computing is a scalable and managed infrastructure and payable as per its usage.the cloud computing technology has been evolved as business cloud models to provide computing infrastructure, datastorage, software applications, programming platforms and hardware as services. SaaS Software as a Service The application is centrally hosted Microsoft office, Google Apps Engine, SalesForce.com apps, PaaS Platform as a Service Software development stack is hosted Window Azure and Google App Engine, Force.com IaaS Infrastructure as Service VMs, Servers, Storage, Networks is hosted Amazon, Web Services Figure A: Cloud Services 334

2 4. Hybrid Cloud Hybrid cloud is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound to gather, offering the benefits of multiple deployment models. For example, an organization might use a public Cloud service, such as Amazon Simple Storage Service (Amazon S3). 1. (SaaS) Software as a Service SaaS Software as a Service provides the entire application as a service to the clients through the internet on demand. The user need not to bother about the hardware or software components needed to run the application. is a perfect example for SaaS. The customers of these services do not managed or control the underlying infrastructure and application platform only limited user-specific configurations are possible. Some of the SaaS vendors are SalesForce.com, Oracle and IBM service. 2. (PaaS) Platform as a Service Platform as a Service provides a computing platform as a service to the user s.the entire software and hardware that the client needs to run an application will be offered as a services. Enable the client to concentrate on the application rather than the required Google Application Engine, Force.com, Microsoft Azure are few of the leading companies offering PaaS. 3. (IaaS) Infrastructure as a Service Infrastructure as a Service provides to the computing and storage resources as per the requirements of clients. The clients do not have to purchase any servers or datacenters and they have to pay for the amount of time they use the resources. Example includes Amazon, Elastic Compute Cloud (EC2), and Microsoft Azure etc. B. Cloud Models Barrie Sosinsky et al., [Barrie Sosinsky et al, 2011] say based on the location where the cloud is hosted, we can classify clouds in to four type s private, public, hybrid and community cloud. 1. Public Cloud The public cloud is a cloud computing deployment scheme that is generally open for use by the general public. The public cloud in as infrastructure used is owned by a cloud services vendor s organization. Examples of public cloud deployment vendor offerings include Amazon, Web Services, Google Application Engine, Salesforce.com, and Microsoft Windows Azure. 2. Private Cloud The private cloud infrastructure is operated solely for one organization and is not shared with other organizations. The purpose of private cloud is to meet the internal computational needs within an organization. This cloud offers more security as it is implemented within the internal firewall. Every aspect of cloud implementation is fully controlled by the organization and hence security wills been enhanced. 3. Community Cloud Community cloud shares infrastructure between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally. C Integrity In Cloud Computing Integrity is an essential in databases similarly integrity of Storages is an essential in the cloud; it is a major factor that affects on the performance of the cloud. The data integrity provides the validity of the data, assuring the consistency or regularity of the data. It is the complete mechanism of writing of the data in a reliable manner to the persistent data storages which can be retrieved in the same format without any changes later. As described above, in cloud, the complete storage of data provided by the end-user is done at the data centers or data storages and the security and integrity of the data lies on the vendor storing data in the data centers but not the cloud hosts. Cloud Storage is gaining popularity for the outsourcing of day-to-day management of data. Therefore just storing data at cloud data storages or data centers doesn t ensure the integrity of data, but some mechanisms are to be implemented at each storage level to ensure the data integrity. Integrity is most important of all the security issues in cloud data storages because it not only ensures completeness of data but also ensures that the data is correct, accessible, consistent and of high quality. II. PROBLEM DEFINITION For checking the integrity of the huge amount of archived data the whole-file checking method becomes prohibitive. Proof of irretrievability and proof of data possession are used to verify the integrity of the large data. If the data is stored in the cloud means the data integrity confirmation is very important. It has more chance to modification in the data. Then we should repair the corrupted data and restore the original data. Store all the data in a single server is vulnerable to the single point-of-failure problem and vendor lock-ins. POR and PDP are used in the proposed for the single-server case. The Erasure coding has a lower storage overhead than replication under the same fault tolerance level. It results in permanent data loss in the server. These schemes can only provide the detection of corrupted data. MR-PDP and HAIL extend integrity checks to a multi server setting using replication and erasure coding. Time consumption for find the original data is very high. III. LITERATURE REVIEW A literature review can be just a simple summary of the sources, but it usually has an organizational pattern and combines both summary and synthesis. B. Chen et al., [B. Chen et al., 2010] say the RDC NC, a novel secure and efficient RDC scheme for network coding based distributed storage systems. RDC NC mitigates new attacks that stem from the underlying principle of network coding. B.Schroeder et al., [B.Schroeder et al., 2010] say the Latent sector errors 335

3 failed server details are sending to the other servers in the cloud. Integrity to the data in cloud server is very important. Because of integrity the variations in the data are confirmed. Each data s integrity is confirmed by the Message Authentication Code the Secure Hash Algorithm (SHA1) is used. If the attacker made any change in the data means then the cloud server can find out this. This is because of the message authentication code. In repair operation the data in the failed server is retrieved by FMSR.It is retrieved by get the same data from the other servers. The data is stored in multiple servers in cloud. The whole data is not stored in multiple servers. The splitting data is stored in multiple servers in cloud. The integrity of the data is also confirmed by the server and provides the data to the client who needs the data. (LSE) refer to implemented and experimentally show that it is computationally inexpensive for both clients and servers.lses are a critical factor in data reliability, since a single LSE can load to data loss when encountered during RAID reconstruction after a disk failure. LSEs happen at a significant rate in the welds, and are expected to grow more frequent with new drive technologies and increasing drive capacities. Y.Xiangtao et al., [Y.Xiangtao et al., 2012] say to an economic solution is looked upon so that the companies and organizations can focus on their businesses rather than on infrastructure. Well! The very concern of the presented literature review is regarding one aspect of cloud security that is named as data integrity maintenance especially in dynamic cloud environment. R.Saravana Kumar et al., [R.Saravana Kumar et al., 2011] say to developed an integrity checking scheme which gives a proof of data integrity in the cloud which could be utilized by the customer to check the correctness of data in the cloud. Yang Lie Wu et al., [Yang Lie Wu et al., 2012] say the method compressed effectively the check value for data integrity to reduce storage, and improved the check efficiency of multi-data objects. Zhou Hao, et al., [Zhou Hao et al., 2011] says a Remote data integrity checking mechanism that did not include any third party auditor. insertion, modification, and deletion at the block level, and also public verifiability were also promoted by this protocol. Wenjun Luo et al., [Wenjun Luo et al., 2011] say to addressed a remote data integrity checking protocol based on HLAs and RSA signature with the support public verifiability. Also, this very mechanism was very satisfactory of cloud storage systems. Q. Wang et al., [Q. Wang et al., 2011] say they concentrated on this very fact because earlier works on ensuring data integrity often lacks the support of either public dynamic operations data. Henry C. H. Chen et al., [Henry C. H. Chen et al., 2011] say the protect outsourced data in cloud storage against corruptions, adding fault tolerance to cloud storage, along with efficient data integrity checking and recovery procedures, becomes critical. Regenerating codes provide fault tolerance data across multiple servers, while using less repair traffic than traditional erasure codes during failure recovery practical data integrity protection (DIP) scheme is designed and implemented for a specific regenerating code, while preserving its intrinsic properties of fault tolerance and repairtraffic is saving. IV. PROPOSED METHOLOGY First of all the client have to be created for use the cloud storage. Then the client selects the particular data that need to be store. Afterwards the data is splitting and then it is stored in the cloud servers. These data can be retrieved by the clients on any time. These data may contain the personal information of the client and splitter data stored in multiple servers in cloud. Each server in cloud contains different data of the clients. If any one of the server is failed means then the data in the server is lost. The data in the failed server is not retrieved from that failed server. Finding the failure node is very important, because from this information the data can be retrieved. The Client Select Upload to Cloud Splitting Start Integrity Protection SHA-1 Find Server Failure Retrieve FMSR Figure IV: Flow Diagram Retrieve Check Integrity Provide to Client Stop 336

4 The figure IV deals the flow diagram proposed very important. The splitter data store in multiple servers in methodology such as Sharing In Cloud, Find Failure cloud. Servers, Repair Operation and Integrity Protection. 2. Find Failure Servers 1. Sharing In Cloud Figure 1: Sharing In Cloud As shown in the figures 1 the client data are uploaded to cloud. Then the client selects the particular data that need to be store.the cloud receives the data uploaded by the client. Then the data is splitting and then.it is stored in the cloud servers. This is done for the security purpose. These data can be retrieved by the client on any time.these data may contain the personal information of the client so the security for the data is Figure 2: Find Failure Servers As shown in the figure 2 to source each server in cloud contains different data of the clients and then the capacity of the servers are also different.if any one of the server is failed means then the data in the server is lost.the data in the failed server is not retrieved from that failed server. That is the disadvantage in the existing system but in our proposed system finding the failure node is very important, because from this information the data can be retrieved the failed 337

5 server details are send to the other servers in the cloud by the server and provides the data to client who needs the data. finding the failure node. In that the integrity checking is very important. 3. Repair Operation 4. Integrity Protection Figure 3: Repair Operation As shows in the figure 3 in repair operation the data in the failed server is retrieved by FMSR. It is retrieved by get the same data from the other servers.because the data is stored in multiple servers in cloud. The whole data is not stored in multiple servers. The splitting data is stored in multiple servers in cloud and then the integrity of the data is also confirmed by Figure 4: Integrity Protection As shows in the figure 4 integrity checking to the data in cloud server is very important this is also one type of the security because of integrity the variations in the data are confirmed, each data s integrity is confirmed by the message authentication code the secure hash algorithm(sha1)is used It is better than the MD5. If the attacker made any change in the data means then the cloud server can find out this..this is 338

6 cloud. The integrity protection scheme for the FMSR codes is used in the multiserver system. FMSR-DIP codes are used for the fault tolerance and repair traffic saving properties of FMSR codes. The security strength of the FMSR-DIP is increased very much. It is evaluated by the mathematical modeling. because of the messages authentication code, so that it is used for the security purpose. V RESULT and ANALYSIS The key sizes of the algorithms are shown as a graph. MAC has two algorithms. They are MD5 and sha-1. For MD5 the key size and for sha-1 the key size is compared. Using this algorithms the integrity of the data are verified. The according to the size of the data time is consumed. Time should be in seconds. Times taken for all the size of the data are displayed A) This graph shows comparisons of MAC (MD5) and MAC (SHA1) REFERENCES 1. L.Ronald, Kurtz, Russell Dean Viness, Cloud Security Comprehensive guide to Secure Cloud Computing, Sikder Sunbeam Islam Muhammad Bagar Mollah Md Imanual Huq,Md. Aman Ullah, Cloud Computing Future Generation of Computing Technology, Barrie Sosinsky, Cloud Computing Bible, B.Chen, R.Curtmola, G.Ateniese, and R.Burns, Remote Checking for Network Coding Based Distributed Storage System, B.Schroeder, S.Damouras, P.Gill, Understanding Latent Sector Errors Y.Xiangtao Yifa Li, Remote Integrity Checking Scheme for Cloud Storage with Privacy Preserving, R.Saravana kumar, Integrity Proof in Cloud Storage, Yang Lie Wu, Yulin Yan, Fine Grained Integrity Check forpower Cloud Computing, Zhuo Hao,Sheng Zhong, A Privacy Preserving Remote Integrity Protocol with Dynamics and Public Verifiability, Wenjun Luo, Guojing, Ensuring Integrity In Cloud Storage, Q.Wang Cong Wang,Kui Wenjing Lou,JinLi, Enabling Public Audibility and Dynamics for Storage Security in Cloud Computing, H.C.H Chen and P.P.C Lee Enabling Integrity Protection In Regenerating Coding Based Cloud Storage, 2012 B)This graph time token for files sizes VI. CONCLUSION Outsourcing the data in the cloud is very useful for clients and the clients need to verify the integrity of their data in the 339

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,

More information

Practical Data Integrity Protection in Network-Coded Cloud Storage

Practical Data Integrity Protection in Network-Coded Cloud Storage Practical Data Integrity Protection in Network-Coded Cloud Storage Henry C. H. Chen Department of Computer Science and Engineering The Chinese University of Hong Kong Outline Introduction FMSR in NCCloud

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of

More information

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering

More information

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department

More information

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing; What is it, How long has it been here, and Where is it going? Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where

More information

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering

More information

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station What is Cloud Computing? http://www.agent-x.com.au/ Wikipedia - the use of computing resources (hardware and software)

More information

Security Analysis of Cloud Computing: A Survey

Security Analysis of Cloud Computing: A Survey Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now

More information

Research Paper on Data Integrity Checking In Cloud Computing

Research Paper on Data Integrity Checking In Cloud Computing Research Paper on Data Integrity Checking In Cloud Computing Indu Bala 1, Savita Bishnoi 2 1 Department of Computer Science & Engineering, Rohtak Institute of Engineering& Management Rohtak, Haryana, India

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India [email protected]

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India

More information

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Renuka Goyal, Navjot Sidhu Centre for Computer Science and Technology, Central University of Punjab Bathinda,

More information

[email protected] [email protected]

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

Cryptographic Data Security over Cloud

Cryptographic Data Security over Cloud Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.

More information

Cloud Computing Architecture: A Survey

Cloud Computing Architecture: A Survey Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and

More information

How To Ensure Correctness Of Data In The Cloud

How To Ensure Correctness Of Data In The Cloud A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana

More information

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981!

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981! Demystifying Cloud Computing What is Cloud Computing? First, a little history. Tim Horgan Head of Cloud Computing Centre of Excellence http://cloud.cit.ie 1" 2" Mainframe Era (1944-1978) Workstation Era

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya

More information

How To Design A Cloud Data Storage Service For A Cloud Computer System

How To Design A Cloud Data Storage Service For A Cloud Computer System Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College

More information

A Web Base Information System Using Cloud Computing

A Web Base Information System Using Cloud Computing A Web Base Information System Using Cloud Computing Zainab Murtadha, Mohammad Amin Roshanasan Abstract: Cloud Computing is the new field that was invented and developed during a period not so long ago.

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

Electronic Records Storage Options and Overview

Electronic Records Storage Options and Overview Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for

More information

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION Sanjay Razdan Department of Computer Science and Eng. Mewar

More information

Cloud Computing An Elephant In The Dark

Cloud Computing An Elephant In The Dark Cloud Computing An Elephant In The Dark Amir H. Payberah [email protected] Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir

More information

Cloud Computing for SCADA

Cloud Computing for SCADA Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Dr Markus Hagenbuchner [email protected] CSCI319 Introduction to Cloud Computing CSCI319 Chapter 1 Page: 1 of 10 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to how

More information

Cloud Computing. Karan Saxena * & Kritika Agarwal**

Cloud Computing. Karan Saxena * & Kritika Agarwal** Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic

More information

CLOUD COMPUTING SECURITY ISSUES

CLOUD COMPUTING SECURITY ISSUES CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights

More information

CLOUD COMPUTING. A Primer

CLOUD COMPUTING. A Primer CLOUD COMPUTING A Primer A Mix of Voices The incredible shrinking CIO CIO Magazine, 2004 IT Doesn t Matter, The cloud will ship service outside the institution and ship power from central IT groups to

More information

Architectural Implications of Cloud Computing

Architectural Implications of Cloud Computing Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,

More information

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:

More information

Cloud Computing Technology

Cloud Computing Technology Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures

More information

Survey On Security Threats In Data Storing & Sharing In Cloud Environment

Survey On Security Threats In Data Storing & Sharing In Cloud Environment Survey On Security Threats In Data Storing & Sharing In Cloud Environment Seema Tahalyani 1 and Dr. S.M Ghosh 2 1 CSE Department, Rungta College of Engineering & Technology, Bhilai, Chhattisgarh, India

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 3 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Using Third Party

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...

More information

Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS

Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

CHAPTER 8 CLOUD COMPUTING

CHAPTER 8 CLOUD COMPUTING CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics

More information

Chapter 1 Introduction

Chapter 1 Introduction 1 1.1. Cloud Computing Chapter 1 Introduction Cloud computing provides the next generation of internet-based, highly scalable distributed computing systems in which computational resources are offered

More information

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG [email protected] Bhupesh Kumar Dewangan Assistant Professor,CSE,

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared

More information

Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop

Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop Kanchan A. Khedikar Department of Computer Science & Engineering Walchand Institute of Technoloy, Solapur, Maharashtra,

More information

CLOUD COMPUTING SECURITY CONCERNS

CLOUD COMPUTING SECURITY CONCERNS CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)

Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle) Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle) Abstract The goal of this session is to understanding what is meant when we say Where in the

More information

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered

More information

A Gentle Introduction to Cloud Computing

A Gentle Introduction to Cloud Computing A Gentle Introduction to Cloud Computing Source: Wikipedia Platform Computing, Inc. Platform Clusters, Grids, Clouds, Whatever Computing The leader in managing large scale shared environments o 18 years

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India

More information

Cloud Computing: Advantages and Security Challenges

Cloud Computing: Advantages and Security Challenges International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 8 (2013), pp. 771-778 International Research Publications House http://www. irphouse.com /ijict.htm Cloud

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify

More information

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud

More information

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Secrecy Maintaining Public Inspecting For Secure Cloud Storage Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan

More information

SaaS, PaaS & TaaS. By: Raza Usmani

SaaS, PaaS & TaaS. By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani SaaS - Introduction Software as a service (SaaS), sometimes referred to as "on-demand software. software and its associated data are hosted centrally (typically in the

More information

Cloud Courses Description

Cloud Courses Description Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment

More information

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted. Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing

More information

20 th Year of Publication. A monthly publication from South Indian Bank. www.sib.co.in

20 th Year of Publication. A monthly publication from South Indian Bank. www.sib.co.in To kindle interest in economic affairs... To empower the student community... Open YAccess www.sib.co.in [email protected] A monthly publication from South Indian Bank 20 th Year of Publication Experience

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

Cloud Computing. Cloud computing:

Cloud Computing. Cloud computing: Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:

More information

CSO Cloud Computing Study. January 2012

CSO Cloud Computing Study. January 2012 CSO Cloud Computing Study January 2012 Purpose and Methodology Survey Sample Survey Method Fielded Dec 20, 2011-Jan 8, 2012 Total Respondents Margin of Error +/- 7.3% Audience Base Survey Goal 178 security

More information

The Top 5 Most Common Cloud Management Functions

The Top 5 Most Common Cloud Management Functions Brochure More information from http://www.researchandmarkets.com/reports/3069769/ Cloud Management: Solutions Assessment and Market Outlook 2015 Description: The Cloud Management ecosystem is rapidly transforming

More information

How To Manage Cloud Data Safely

How To Manage Cloud Data Safely Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In

More information

International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072

International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072 Fear of Cloud Vinnakota Saran Chaitanya 1, G. Harshavardhan Reddy 2 1 UG Final year student, Department of Computer Science and Engineering, G. Pulla Reddy Engineering College, Andhra Pradesh, India 2

More information

The NIST Definition of Cloud Computing (Draft)

The NIST Definition of Cloud Computing (Draft) Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication

More information

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National

More information

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the

More information

Lecture 02a Cloud Computing I

Lecture 02a Cloud Computing I Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking

More information

SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE

SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE H.Madhusudhana Rao* Md. Rahmathulla** Dr. B Rambhupal Reddy*** Abstract: This paper targets on the productivity of cloud computing technology in healthcare

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Platforms

More information

Oracle Applications and Cloud Computing - Future Direction

Oracle Applications and Cloud Computing - Future Direction Oracle Applications and Cloud Computing - Future Direction February 26, 2010 03:00 PM 03:40 PM Presented By Subash Krishnaswamy [email protected] Vijay Tirumalai [email protected]

More information

Private Cloud in Educational Institutions: An Implementation using UEC

Private Cloud in Educational Institutions: An Implementation using UEC Private Cloud in Educational Institutions: An Implementation using UEC D. Sudha Devi L.Yamuna Devi K.Thilagavathy,Ph.D P.Aruna N.Priya S. Vasantha,Ph.D ABSTRACT Cloud Computing, the emerging technology,

More information

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India

More information

Cloud Computing: The Next Computing Paradigm

Cloud Computing: The Next Computing Paradigm Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea [email protected],

More information

CLOUD COMPUTING. When It's smarter to rent than to buy

CLOUD COMPUTING. When It's smarter to rent than to buy CLOUD COMPUTING When It's smarter to rent than to buy Is it new concept? Nothing new In 1990 s, WWW itself Grid Technologies- Scientific applications Online banking websites More convenience Not to visit

More information

Cloud Computing Services and its Application

Cloud Computing Services and its Application Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its

More information

Multilevel Communication Aware Approach for Load Balancing

Multilevel Communication Aware Approach for Load Balancing Multilevel Communication Aware Approach for Load Balancing 1 Dipti Patel, 2 Ashil Patel Department of Information Technology, L.D. College of Engineering, Gujarat Technological University, Ahmedabad 1

More information

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,

More information

Cloud Server Storage Security Using TPA

Cloud Server Storage Security Using TPA Cloud Server Storage Security Using TPA I K.Meenakshi, II Victo Sudha George I Student (M.Tech), DR. MGR Educational and Research Institute, India II Assisstant Professo, DR. MGR Educational and Research

More information

Investigation of Cloud Computing: Applications and Challenges

Investigation of Cloud Computing: Applications and Challenges Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,

More information

A STUDY ON CLOUD STORAGE

A STUDY ON CLOUD STORAGE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.966

More information